Trojan horse is -:
(A)A program that overtly does one thing while covertly doinganother
(B)Can be used to spread infection from one computer to another.(C)A program that has a secret entry point.(D)Others
- Storage media(A)A collections of software, hardware(B)The
intruder may steal computer time just to do computing and hecan destroy software(C)
Effective security plans consider adequate backups of data andphysical protection for the media contains these backups.
- OS Controls:
(A)Limitations enforced By the OS to protect each user from otherusers
(B)Quality standards under which program is designed, coded, testedund maintained(C)Parts of the program that enforce security restriction such as accesslimitation in a data base management system(D)Others11- Cipher text is:
(A)The encrypted form.
(B)A system of encryption and decryption(C)Hidden writing.(D)Others
(A)Runs when its attached program executes and terminates whenits attached program ends
(B)Locates itself in memory so that it can remain active even after itsattached program ends(C)A class of malicious code that detonates when a specified conditionoccurs(D)Others13- Packet-filtering Router means:
(A)Applies a set of rules to each incoming IP packet and thenforwards or discards the packet
(B)Also called proxy server (C)Acts as a relay of application-level traffic(D)Others3